Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2023-45814

Опубликовано: 18 окт. 2023
Источник: nvd
CVSS3: 5.3
EPSS Низкий

Описание

Bunkum is an open-source protocol-agnostic request server for custom game servers. First, a little bit of background. So, in the beginning, Bunkum's AuthenticationService only supported injecting IUsers. However, as Refresh and SoundShapesServer implemented permissions systems support for injecting ITokens into endpoints was added. All was well until 4.0. Bunkum 4.0 then changed to enforce relations between ITokens and IUsers. This wasn't implemented in a very good way in the AuthenticationService, and ended up breaking caching in such a way that cached tokens would persist after the lifetime of the request - since we tried to cache both tokens and users. From that point until now, from what I understand, Bunkum was attempting to use that cached token at the start of the next request once cached. Naturally, when that token expired, downstream projects like Refresh would remove the object from Realm - and cause the object in the cache to be in a detached state, causing an ex

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:littlebigfresh:bunkum:*:*:*:*:*:*:*:*
Версия от 4.0 (включая) до 4.2.1 (исключая)

EPSS

Процентиль: 32%
0.00127
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-772
CWE-772

Связанные уязвимости

CVSS3: 5.3
github
больше 2 лет назад

Bunkum tokens cached in the AuthenticationService are susceptible to a use-after-free

EPSS

Процентиль: 32%
0.00127
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-772
CWE-772